Static task
static1
Behavioral task
behavioral1
Sample
f8fa369c4fb7bcf652a2e01c4d1e10ca_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8fa369c4fb7bcf652a2e01c4d1e10ca_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f8fa369c4fb7bcf652a2e01c4d1e10ca_JaffaCakes118
-
Size
437KB
-
MD5
f8fa369c4fb7bcf652a2e01c4d1e10ca
-
SHA1
3a38436a0f8d53a29cc884405d9f661e33f9c240
-
SHA256
eba51c65d96d61f77b69c354c9880ccb63ea7a6252c67ea96a4a2e39ff4ec89f
-
SHA512
6e5393097de749c28ff4a2e99e472025423a7e5a058c495e4127fc5b162e5040a755a97742535aef7712b288f49dbac859882cb60fb6590996f8a23c95511db1
-
SSDEEP
12288:vGXx6JVfytnQ59r0KmdZEWpYvgyW3OVbtygpHLspT7v:vrJOnQ561kW3EbTr6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f8fa369c4fb7bcf652a2e01c4d1e10ca_JaffaCakes118
Files
-
f8fa369c4fb7bcf652a2e01c4d1e10ca_JaffaCakes118.exe windows:4 windows x86 arch:x86
eced44adf604744d28eea0b8b394888b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetTextColor
SetColorAdjustment
ColorMatchToTarget
GetWorldTransform
FillRgn
SetBitmapBits
CloseEnhMetaFile
FixBrushOrgEx
GetSystemPaletteUse
RectVisible
GetSystemPaletteEntries
kernel32
SetLastError
GetOEMCP
HeapDestroy
VirtualProtect
FreeEnvironmentStringsW
WriteConsoleInputW
GetSystemTimeAsFileTime
TlsSetValue
GetStdHandle
HeapSize
GetStringTypeW
GetCommandLineW
EnumSystemLocalesA
LeaveCriticalSection
GetUserDefaultLCID
ExitProcess
VirtualFree
GetCurrentProcessId
GetTickCount
EnterCriticalSection
FreeEnvironmentStringsA
CompareStringA
HeapCreate
GetModuleFileNameA
UnhandledExceptionFilter
GetStringTypeA
LoadLibraryA
WriteFile
HeapAlloc
GetFileType
QueryPerformanceCounter
GetEnvironmentStrings
GetModuleHandleA
IsValidLocale
MultiByteToWideChar
SetEnvironmentVariableA
CompareStringW
LCMapStringA
IsValidCodePage
GetModuleFileNameW
GetTimeZoneInformation
GetProcAddress
TlsGetValue
TerminateProcess
GetCurrentThreadId
InterlockedExchange
GetLastError
TlsAlloc
TlsFree
GetEnvironmentStringsW
GetSystemInfo
LCMapStringW
GetCurrentProcess
InitializeCriticalSection
GetStartupInfoW
GetCurrentThread
HeapReAlloc
RtlUnwind
GetVersionExA
GetCPInfo
HeapFree
VirtualAlloc
GetTimeFormatA
WideCharToMultiByte
GetLocaleInfoA
VirtualQuery
DeleteCriticalSection
SetHandleCount
GetStartupInfoA
GetCommandLineA
GetACP
GetLocaleInfoW
IsBadWritePtr
GetDateFormatA
wininet
FindFirstUrlCacheContainerW
FtpCommandW
comdlg32
ChooseFontW
advapi32
CryptSetProviderExW
StartServiceW
CryptSetKeyParam
RegRestoreKeyA
RegConnectRegistryW
CryptDuplicateHash
shell32
ExtractAssociatedIconW
SHBrowseForFolderW
SheSetCurDrive
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ